메뉴 건너뛰기




Volumn , Issue , 2005, Pages 271-298

Securing peer-to-peer networks using trusted computing

Author keywords

Computer network security; Peer to peer computing; Peer to peer network security; TCG compliant computing platforms; Trusted computing

Indexed keywords

COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; PEER TO PEER NETWORKS; TRUSTED COMPUTING;

EID: 85013594843     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1049/PBPC006E_ch10     Document Type: Chapter
Times cited : (19)

References (36)
  • 3
    • 33750040628 scopus 로고    scopus 로고
    • Available at
    • Trusted Computing Group. TCG software stack specificiation version 1.1, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
    • (2003) TCG software stack specificiation version 1.1
  • 6
    • 84955566566 scopus 로고    scopus 로고
    • Aprivacy-enhanced peer-to-peer reputation system
    • K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, eds, Springer-Verlag, Berlin
    • M. Kinateder and S. Pearson.Aprivacy-enhanced peer-to-peer reputation system. In K. Bauknecht, A. M. Tjoa, and G. Quirchmayr, eds, Proceedings of EC-Web 2003, volume 2738 of Lecture Notes in Computer Science, pp. 206-216, Springer-Verlag, Berlin, 2003.
    • (2003) Proceedings of EC-Web 2003, volume 2738 of Lecture Notes in Computer Science , pp. 206-216
    • Kinateder, M.1    Pearson, S.2
  • 25
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 34
    • 84872375897 scopus 로고    scopus 로고
    • Available at
    • Trusted Computing Group. TPM main: part 3 commands, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
    • (2003) TPM main: Part 3 commands
  • 35
    • 70749096362 scopus 로고    scopus 로고
    • Available at
    • Trusted Computing Group. TPM main: part 1 design principles, 2003. Available at https://www.trustedcomputinggroup.org/downloads/specifications
    • (2003) TPM main: Part 1 design principles


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.